pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,25 +21,25 @@ __all__ = ['SecretStaticAccountArgs', 'SecretStaticAccount']
22
21
  @pulumi.input_type
23
22
  class SecretStaticAccountArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- service_account_email: pulumi.Input[builtins.str],
27
- static_account: pulumi.Input[builtins.str],
24
+ backend: pulumi.Input[_builtins.str],
25
+ service_account_email: pulumi.Input[_builtins.str],
26
+ static_account: pulumi.Input[_builtins.str],
28
27
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
31
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
30
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
32
31
  """
33
32
  The set of arguments for constructing a SecretStaticAccount resource.
34
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
35
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
36
- :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
33
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
34
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
35
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
37
36
  :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
38
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
37
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
39
38
  The value should not contain leading or trailing forward slashes.
40
39
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
40
  *Available only for Vault Enterprise*.
42
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
43
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
41
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
42
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
44
43
  """
45
44
  pulumi.set(__self__, "backend", backend)
46
45
  pulumi.set(__self__, "service_account_email", service_account_email)
@@ -54,43 +53,43 @@ class SecretStaticAccountArgs:
54
53
  if token_scopes is not None:
55
54
  pulumi.set(__self__, "token_scopes", token_scopes)
56
55
 
57
- @property
56
+ @_builtins.property
58
57
  @pulumi.getter
59
- def backend(self) -> pulumi.Input[builtins.str]:
58
+ def backend(self) -> pulumi.Input[_builtins.str]:
60
59
  """
61
60
  Path where the GCP Secrets Engine is mounted
62
61
  """
63
62
  return pulumi.get(self, "backend")
64
63
 
65
64
  @backend.setter
66
- def backend(self, value: pulumi.Input[builtins.str]):
65
+ def backend(self, value: pulumi.Input[_builtins.str]):
67
66
  pulumi.set(self, "backend", value)
68
67
 
69
- @property
68
+ @_builtins.property
70
69
  @pulumi.getter(name="serviceAccountEmail")
71
- def service_account_email(self) -> pulumi.Input[builtins.str]:
70
+ def service_account_email(self) -> pulumi.Input[_builtins.str]:
72
71
  """
73
72
  Email of the GCP service account to manage.
74
73
  """
75
74
  return pulumi.get(self, "service_account_email")
76
75
 
77
76
  @service_account_email.setter
78
- def service_account_email(self, value: pulumi.Input[builtins.str]):
77
+ def service_account_email(self, value: pulumi.Input[_builtins.str]):
79
78
  pulumi.set(self, "service_account_email", value)
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter(name="staticAccount")
83
- def static_account(self) -> pulumi.Input[builtins.str]:
82
+ def static_account(self) -> pulumi.Input[_builtins.str]:
84
83
  """
85
84
  Name of the Static Account to create
86
85
  """
87
86
  return pulumi.get(self, "static_account")
88
87
 
89
88
  @static_account.setter
90
- def static_account(self, value: pulumi.Input[builtins.str]):
89
+ def static_account(self, value: pulumi.Input[_builtins.str]):
91
90
  pulumi.set(self, "static_account", value)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
94
  def bindings(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]:
96
95
  """
@@ -102,9 +101,9 @@ class SecretStaticAccountArgs:
102
101
  def bindings(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]):
103
102
  pulumi.set(self, "bindings", value)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter
107
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
106
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
108
107
  """
109
108
  The namespace to provision the resource in.
110
109
  The value should not contain leading or trailing forward slashes.
@@ -114,58 +113,58 @@ class SecretStaticAccountArgs:
114
113
  return pulumi.get(self, "namespace")
115
114
 
116
115
  @namespace.setter
117
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
116
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
118
117
  pulumi.set(self, "namespace", value)
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter(name="secretType")
122
- def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
121
+ def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
123
122
  """
124
123
  Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
125
124
  """
126
125
  return pulumi.get(self, "secret_type")
127
126
 
128
127
  @secret_type.setter
129
- def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
128
+ def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
130
129
  pulumi.set(self, "secret_type", value)
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter(name="tokenScopes")
134
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
133
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
135
134
  """
136
135
  List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
137
136
  """
138
137
  return pulumi.get(self, "token_scopes")
139
138
 
140
139
  @token_scopes.setter
141
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
140
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
142
141
  pulumi.set(self, "token_scopes", value)
143
142
 
144
143
 
145
144
  @pulumi.input_type
146
145
  class _SecretStaticAccountState:
147
146
  def __init__(__self__, *,
148
- backend: Optional[pulumi.Input[builtins.str]] = None,
147
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
149
148
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]] = None,
150
- namespace: Optional[pulumi.Input[builtins.str]] = None,
151
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
152
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
153
- service_account_project: Optional[pulumi.Input[builtins.str]] = None,
154
- static_account: Optional[pulumi.Input[builtins.str]] = None,
155
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
149
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
150
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
151
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
152
+ service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
153
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
154
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
156
155
  """
157
156
  Input properties used for looking up and filtering SecretStaticAccount resources.
158
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
157
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
159
158
  :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
160
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
159
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
161
160
  The value should not contain leading or trailing forward slashes.
162
161
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
163
162
  *Available only for Vault Enterprise*.
164
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
165
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
166
- :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
167
- :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
168
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
163
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
164
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
165
+ :param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
166
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
167
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
169
168
  """
170
169
  if backend is not None:
171
170
  pulumi.set(__self__, "backend", backend)
@@ -184,19 +183,19 @@ class _SecretStaticAccountState:
184
183
  if token_scopes is not None:
185
184
  pulumi.set(__self__, "token_scopes", token_scopes)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter
189
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
188
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
190
189
  """
191
190
  Path where the GCP Secrets Engine is mounted
192
191
  """
193
192
  return pulumi.get(self, "backend")
194
193
 
195
194
  @backend.setter
196
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
195
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
197
196
  pulumi.set(self, "backend", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter
201
200
  def bindings(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]:
202
201
  """
@@ -208,9 +207,9 @@ class _SecretStaticAccountState:
208
207
  def bindings(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]):
209
208
  pulumi.set(self, "bindings", value)
210
209
 
211
- @property
210
+ @_builtins.property
212
211
  @pulumi.getter
213
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
212
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
214
213
  """
215
214
  The namespace to provision the resource in.
216
215
  The value should not contain leading or trailing forward slashes.
@@ -220,67 +219,67 @@ class _SecretStaticAccountState:
220
219
  return pulumi.get(self, "namespace")
221
220
 
222
221
  @namespace.setter
223
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
222
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
224
223
  pulumi.set(self, "namespace", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter(name="secretType")
228
- def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
227
+ def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
229
228
  """
230
229
  Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
231
230
  """
232
231
  return pulumi.get(self, "secret_type")
233
232
 
234
233
  @secret_type.setter
235
- def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
234
+ def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
236
235
  pulumi.set(self, "secret_type", value)
237
236
 
238
- @property
237
+ @_builtins.property
239
238
  @pulumi.getter(name="serviceAccountEmail")
240
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
239
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
241
240
  """
242
241
  Email of the GCP service account to manage.
243
242
  """
244
243
  return pulumi.get(self, "service_account_email")
245
244
 
246
245
  @service_account_email.setter
247
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
246
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
248
247
  pulumi.set(self, "service_account_email", value)
249
248
 
250
- @property
249
+ @_builtins.property
251
250
  @pulumi.getter(name="serviceAccountProject")
252
- def service_account_project(self) -> Optional[pulumi.Input[builtins.str]]:
251
+ def service_account_project(self) -> Optional[pulumi.Input[_builtins.str]]:
253
252
  """
254
253
  Project the service account belongs to.
255
254
  """
256
255
  return pulumi.get(self, "service_account_project")
257
256
 
258
257
  @service_account_project.setter
259
- def service_account_project(self, value: Optional[pulumi.Input[builtins.str]]):
258
+ def service_account_project(self, value: Optional[pulumi.Input[_builtins.str]]):
260
259
  pulumi.set(self, "service_account_project", value)
261
260
 
262
- @property
261
+ @_builtins.property
263
262
  @pulumi.getter(name="staticAccount")
264
- def static_account(self) -> Optional[pulumi.Input[builtins.str]]:
263
+ def static_account(self) -> Optional[pulumi.Input[_builtins.str]]:
265
264
  """
266
265
  Name of the Static Account to create
267
266
  """
268
267
  return pulumi.get(self, "static_account")
269
268
 
270
269
  @static_account.setter
271
- def static_account(self, value: Optional[pulumi.Input[builtins.str]]):
270
+ def static_account(self, value: Optional[pulumi.Input[_builtins.str]]):
272
271
  pulumi.set(self, "static_account", value)
273
272
 
274
- @property
273
+ @_builtins.property
275
274
  @pulumi.getter(name="tokenScopes")
276
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
275
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
277
276
  """
278
277
  List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
279
278
  """
280
279
  return pulumi.get(self, "token_scopes")
281
280
 
282
281
  @token_scopes.setter
283
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
282
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
284
283
  pulumi.set(self, "token_scopes", value)
285
284
 
286
285
 
@@ -290,13 +289,13 @@ class SecretStaticAccount(pulumi.CustomResource):
290
289
  def __init__(__self__,
291
290
  resource_name: str,
292
291
  opts: Optional[pulumi.ResourceOptions] = None,
293
- backend: Optional[pulumi.Input[builtins.str]] = None,
292
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
294
293
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
295
- namespace: Optional[pulumi.Input[builtins.str]] = None,
296
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
297
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
298
- static_account: Optional[pulumi.Input[builtins.str]] = None,
299
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
294
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
295
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
296
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
297
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
298
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
300
299
  __props__=None):
301
300
  """
302
301
  Creates a Static Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -338,16 +337,16 @@ class SecretStaticAccount(pulumi.CustomResource):
338
337
 
339
338
  :param str resource_name: The name of the resource.
340
339
  :param pulumi.ResourceOptions opts: Options for the resource.
341
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
340
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
342
341
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
343
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
342
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
344
343
  The value should not contain leading or trailing forward slashes.
345
344
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
346
345
  *Available only for Vault Enterprise*.
347
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
348
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
349
- :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
350
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
346
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
347
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
348
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
349
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
351
350
  """
352
351
  ...
353
352
  @overload
@@ -408,13 +407,13 @@ class SecretStaticAccount(pulumi.CustomResource):
408
407
  def _internal_init(__self__,
409
408
  resource_name: str,
410
409
  opts: Optional[pulumi.ResourceOptions] = None,
411
- backend: Optional[pulumi.Input[builtins.str]] = None,
410
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
412
411
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
413
- namespace: Optional[pulumi.Input[builtins.str]] = None,
414
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
415
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
416
- static_account: Optional[pulumi.Input[builtins.str]] = None,
417
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
412
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
413
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
414
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
415
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
416
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
418
417
  __props__=None):
419
418
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
420
419
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -448,14 +447,14 @@ class SecretStaticAccount(pulumi.CustomResource):
448
447
  def get(resource_name: str,
449
448
  id: pulumi.Input[str],
450
449
  opts: Optional[pulumi.ResourceOptions] = None,
451
- backend: Optional[pulumi.Input[builtins.str]] = None,
450
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
452
451
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
453
- namespace: Optional[pulumi.Input[builtins.str]] = None,
454
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
455
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
456
- service_account_project: Optional[pulumi.Input[builtins.str]] = None,
457
- static_account: Optional[pulumi.Input[builtins.str]] = None,
458
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'SecretStaticAccount':
452
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
453
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
454
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
455
+ service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
456
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
457
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretStaticAccount':
459
458
  """
460
459
  Get an existing SecretStaticAccount resource's state with the given name, id, and optional extra
461
460
  properties used to qualify the lookup.
@@ -463,17 +462,17 @@ class SecretStaticAccount(pulumi.CustomResource):
463
462
  :param str resource_name: The unique name of the resulting resource.
464
463
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
465
464
  :param pulumi.ResourceOptions opts: Options for the resource.
466
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
465
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
467
466
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
468
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
467
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
469
468
  The value should not contain leading or trailing forward slashes.
470
469
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
471
470
  *Available only for Vault Enterprise*.
472
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
473
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
474
- :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
475
- :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
476
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
471
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
472
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
473
+ :param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
474
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
475
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
477
476
  """
478
477
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
479
478
 
@@ -489,15 +488,15 @@ class SecretStaticAccount(pulumi.CustomResource):
489
488
  __props__.__dict__["token_scopes"] = token_scopes
490
489
  return SecretStaticAccount(resource_name, opts=opts, __props__=__props__)
491
490
 
492
- @property
491
+ @_builtins.property
493
492
  @pulumi.getter
494
- def backend(self) -> pulumi.Output[builtins.str]:
493
+ def backend(self) -> pulumi.Output[_builtins.str]:
495
494
  """
496
495
  Path where the GCP Secrets Engine is mounted
497
496
  """
498
497
  return pulumi.get(self, "backend")
499
498
 
500
- @property
499
+ @_builtins.property
501
500
  @pulumi.getter
502
501
  def bindings(self) -> pulumi.Output[Optional[Sequence['outputs.SecretStaticAccountBinding']]]:
503
502
  """
@@ -505,9 +504,9 @@ class SecretStaticAccount(pulumi.CustomResource):
505
504
  """
506
505
  return pulumi.get(self, "bindings")
507
506
 
508
- @property
507
+ @_builtins.property
509
508
  @pulumi.getter
510
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
509
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
511
510
  """
512
511
  The namespace to provision the resource in.
513
512
  The value should not contain leading or trailing forward slashes.
@@ -516,41 +515,41 @@ class SecretStaticAccount(pulumi.CustomResource):
516
515
  """
517
516
  return pulumi.get(self, "namespace")
518
517
 
519
- @property
518
+ @_builtins.property
520
519
  @pulumi.getter(name="secretType")
521
- def secret_type(self) -> pulumi.Output[builtins.str]:
520
+ def secret_type(self) -> pulumi.Output[_builtins.str]:
522
521
  """
523
522
  Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
524
523
  """
525
524
  return pulumi.get(self, "secret_type")
526
525
 
527
- @property
526
+ @_builtins.property
528
527
  @pulumi.getter(name="serviceAccountEmail")
529
- def service_account_email(self) -> pulumi.Output[builtins.str]:
528
+ def service_account_email(self) -> pulumi.Output[_builtins.str]:
530
529
  """
531
530
  Email of the GCP service account to manage.
532
531
  """
533
532
  return pulumi.get(self, "service_account_email")
534
533
 
535
- @property
534
+ @_builtins.property
536
535
  @pulumi.getter(name="serviceAccountProject")
537
- def service_account_project(self) -> pulumi.Output[builtins.str]:
536
+ def service_account_project(self) -> pulumi.Output[_builtins.str]:
538
537
  """
539
538
  Project the service account belongs to.
540
539
  """
541
540
  return pulumi.get(self, "service_account_project")
542
541
 
543
- @property
542
+ @_builtins.property
544
543
  @pulumi.getter(name="staticAccount")
545
- def static_account(self) -> pulumi.Output[builtins.str]:
544
+ def static_account(self) -> pulumi.Output[_builtins.str]:
546
545
  """
547
546
  Name of the Static Account to create
548
547
  """
549
548
  return pulumi.get(self, "static_account")
550
549
 
551
- @property
550
+ @_builtins.property
552
551
  @pulumi.getter(name="tokenScopes")
553
- def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
552
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
554
553
  """
555
554
  List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
556
555
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: